MDM

May 12, 2013

NETWORKING

Have You Registered for Centralize Policy, Control and Enforcement May 15th?

Activate the IT Transformation with Unified Access: Part 4 –  Centralized Policy, Control, and Enforcement  Wednesday, May 15, 2013  10am-11am PDT     |       Register Now Don’t miss the next in line of our five-part Unified Access Webinar Series  on May 15th to hear how organizations in…

May 9, 2013

NETWORKING

See How Organizations Use Cisco ISE to Centralize Policy and Secure Access

Activate the IT Transformation with Unified Access: Part 4 –  Centralized Policy, Control, and Enforcement  Wednesday, May 15, 2013  10am-11am PDT     |       Register Now With more users and devices being added to your network every day, unified access and central policy control have become c…

May 7, 2013

TECHWISETV

MDM and Cisco’s ISE?

Mobile Device Management or MDM is ideal for addressing many challenges inherent to our ‘Bring your own Device’ culture. MDM can help enforce policy for mobile devices but when you look closer, you begin to realize it does not solve everything. The challenge is when we ask our MDM technology to make…

May 7, 2013

SECURITY

Shedding More Light on MDM

My friends at Cisco’s TechWiseTV have taken MDM to heart and have offered some keen insight from a geek’s POV (point of view) into MDM. Starting with a primer on MDM, Networking 101: MDM, Jimmy Ray answers the questions on what is MDM and what can it do for my organization in his entertaining and ed…

April 4, 2013

SECURITY

Consider the Best Approach for Your BYOD Mobility Environment

MDM Today and the Future Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increa…

April 4, 2013

SECURITY

Securing a BYOD Environment Requires Deployment Flexibility

When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First…

February 25, 2013

SECURITY

Judge for yourself: Taking Dell to task on “holistic” security claims

In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as…

February 20, 2013

SECURITY

Cisco and Citrix Join Forces to Bring New Mobile Device Management Services to Market

Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an acceptable IT cost structure is no small feat. Cisco joi…

February 11, 2013

SECURITY

Securing Any Device—For the Exceptional Connected Experience

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer netwo…